Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords

Size: px
Start display at page:

Download "Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords"

Transcription

1 Institute of Advanced Engineering and Science International Journal of Information & Network Security (IJINS) Vol.1, No.3, August 2012, pp. 163~170 ISSN: Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords M.Kameswara Rao*, Sushma Yalamanchili ** * Department of Computer Science, P.G.Centre, P.B.Siddhartha College of Arts& Science. ** Department of CSE, NRI Institute of Technology, Agiripalli. Article Info Article history: Received Jun 06 th, 2012 Revised July 07 th, 2012 Accepted July 22 th, 2012 Keyword: Authentication Text-graphical-Passwords Shoulder- surfing Spyware attacks Usability Corresponding Author: First Author, Department of Computer Science, P.G.Centre, P.B.Siddhartha College of Arts& Science, India kamesh.manchiraju@gmail.com ABSTRACT There are many applications which require the user to be authenticated before being permitted to perform certain tasks. Text password-based authentication is a popularly used authentication mechanism. Despite having greater security, text-passwords are characterized by selection of a weak and easy to remember passwords. Users also tend to write them down and share them with friends, family members and colleagues defeating the security provided by text-passwords. Graphical passwords offer an alternative to text passwords as the password space is typically higher, less prone to dictionary attacks and easier to remember visually. However, they suffer from shoulder-surfing attacks. In this paper, we propose two authentication schemes that support keyboard as well as graphical mouse-based input that map password characters to other regions of the password space. This shields the user s password from being known to the adversary thus deflecting shoulder-surfing and spyware attacks. The schemes include both single and multi color input images consisting of printable characters. An analysis of security, usability, memorability and social engineering aspects of the proposed schemes is presented. Future research directions are also presented Institute of Advanced Engineering and Science. All rights reserved. 1. INTRODUCTION Authentication determines whether a user should be allowed access to a particular system or resource. Conventional passwords are used widely for authentication, but they are known to have security, memorability and social engineering problems. Drawbacks of conventional passwords include password theft, forgetting passwords and choice of weak passwords. Researchers have designed advanced passwordbased authentication systems relying on graphical passwords which have improved password space and can be better remembered by humans as psychological studies have shown that people can remember pictures better than text [1] and suggest that humans are better at recognizing visual information than recalling meaningless text-based strings. Graphical password-based authentication schemes are commonly vulnerable to shoulder-surfing attacks wherein an adversary observes the password being input by the user. Graphical password schemes are also vulnerable to spyware attacks which monitor keyboard input or mouse clicks. These attacks can be avoided by mapping the characters in a password to other regions in the password space based on a set of rules. Inputting characters or clicking with mouse in the mapped password regions is the equivalent of the pass-characters being input and results in the user getting authenticated without revealing the actual characters in the password string. Journal homepage: IJINS w w w. i a e s j o u r n a l. c o m

2 164 ISSN: RELATED WORK Studies of graphical password schemes have been taken up and are presented in [2, 3, 4, 5, 6, 7]. Recognition-based graphical password schemes are those where a user is presented with a set of images and the user gets authenticated by recognizing and identifying the images that were selected during registration. R.Dhamija et al. [8] proposed a graphical authentication scheme in which the user needs to identify a sequence of images from among a set of random pictures. Jansen et al. [9] proposed a graphical password mechanism for mobile devices where image thumbnails need to be selected in sequence that match the graphical password images related to a theme. Takada and Koike [10] discuss a scheme for mobile devices where at every round the user either selects a pass-image among several decoy-images or chooses nothing if no pass-image is present. In Passface scheme [11] the user needs to identify four human faces from among decoy faces. In recall-based techniques, a user is asked to reproduce something that was selected earlier during the registration. Reproduce-a-drawing and Repeat-a-selection are the basic types of recall-based password techniques. Reproduce-a-drawing authentication methods include Draw-a-secret (DAS) scheme proposed by Jermyn et al. [2], Passdoodle scheme proposed by Goldberg et al. [12] and signature drawing scheme proposed by Syukri [13]. In Repeata-Sequence authentication algorithms, a user is asked to repeat sequences of actions performed by the user during password registration. Methods under this category include Blonder method [14], Passpoint method [15] and Passlogix method [16]. Several shoulder-surfing resistant schemes have been proposed in literature [17]. Man et al. [18] proposed a scheme where the user gets authenticated by inputting unique codes corresponding to the chosen pass-objects from amongst a set which includes decoy-objects. Wiedenbeck and Birget [19] developed a shoulder-surfing resistant graphical password technique in which the system will display a number of graphical icons. To be authenticated, a user needs to recognize the chosen icons and click inside the convex hull formed by them. Malek et al propose a personal entropy-based system that relies on binary pressure when a user draws a secret [20] while Kumar et al propose a scheme that uses the orientation of the human pupil for selection of password, personal identification number [21] making both schemes resistant to shoulder surfing. Zhao and Li [22] proposed S3PAS that is a scalable shoulder-surfing resistant password authentication scheme (PAS). Forget et al propose a cued-recall eye gaze authentication system that facilitates memorizing of multiple distinct passwords. In the scheme proposed by Gao [24], users draw a curve along their images in order with some variations such as degraded images and starting and ending with randomly designated images which is shoulder-surfing resistant. 3. PROPOSED WORK We put forth two authentication schemes using graphical passwords and discuss key aspects of authentication for each of these schemes. The proposed schemes are PairPassChar (PPC) and TricolorPairPassChar (TPPC). Each of these schemes supports two modes of input, namely, keyboard entry and mouse clicks. We refer to the former mode as the text mode and the latter as the graphical mode. The input image consists of a 10x10 grid of cells each of which represent the characters A-Z, a-z, 0-9 and other printable characters which are padded with spaces in a single color and randomly spaced on the grid. In this paper, we refer to this as the basic character set and is used in the PPC scheme. The same character set in three colors randomly spaced and padded with spaces in a 17x17 grid is the color character set and is used as the input image in the TPPC scheme. The pass-characters in the password string are mapped to other portions of the password space and therefore avoid shoulder surfing and spyware attacks. The password is changed after a specified number of logins or failed attempts. This feature is a deterrent to brute force attack. In following discussion, we refer to the characters in the password string as the pass-characters and a pair of pass characters under consideration as a pass-character pair. Let n represent the length of the password and p 1 p 2 p n represent the password. In both schemes, we process one pass-character pair at a time sliding to the right one character at a time and wrapping around until the last pass-character forms the first character in the pass-character pair. To login, users have to give input by entering in a character or by clicking on a character for each of the pass-character pairs {p 1,p 2 }, {p 2,p 3 }, {p n 1,p n }, {p n, p 1 } pairs in the login image PairPasswordChar (PPC) scheme In this scheme, the image consists of the basic 10x10 character set. We propose the rules that govern the allowable input corresponding to each pass-character pair. At the end of the statement of rules, we demonstrate how a user may offer input corresponding to a specific password. IJINS Vol. 1, No. 3, August 2012 :

3 IJINS ISSN: Figure 1. Basic 94-character set Rule 1 : If both pass-characters in the current pass-character pair form a vertical line, the rectangle formed by the pass-characters and their corresponding mirror characters with respect to Y axis is identified. In graphical mode, the user can click anywhere within a rectangle for a successful click. In text mode, typing in any of the characters that lies on the border of the rectangle is considered to be successful. Example: If the pair is a, t then the rectangle is a, 0, W, t. For the graphical mode, clicking anywhere in the rectangle is a successful click. In the text mode, any of the characters successful click can be any of the cells a, u, r, }, Q, g, Y, 0, [, >, 3, W, C, +, V, Z, s, 8, t, B, S, L. Rule 2 : If both pass-characters in the current pass-character pair form a horizontal line then the rectangle formed by the pass-characters and their corresponding mirror characters with respect to X axis is identified. In graphical mode, clicking anywhere in the rectangle is a successful click. In text mode, typing in any character that corresponds to the cells that form the border of the rectangle is successful. Example: If the pair is u, g then the rectangle is u, g, i, D. In graphical mode, clicking anywhere in the rectangle is a successful click. In text mode, successful click can be any of the cells a, u, r, }, Q, g, i, f, o, 9, D. Rule 3 : If the pass-characters in the current pair appear on different rows and columns then the rectangle formed by pass-character pair and their corresponding diagonal rectangle vertices is identified. In the graphical mode, clicking anywhere in the rectangle is a successful click. In the text mode, typing in any character that lies on the cells that lie on the border of the rectangle is successful. Example: If the pass characters in the current pair are M, d. Rectangle will be formed with M, d as diagonal rectangle vertices. Thus the rectangle is M, y, d, b. For graphical mode, clicking anywhere in this rectangle is a successful click. For text mode, typing in any of the characters from the outline cells ie. M, <,, y, Q, f, d, X, H, b is considered to be successful. Rule 4: If the two pass-characters in the current pass-character pair are the same, the rectangle formed by the pass-character with its mirror character in the diagonal quadrant as diagonal rectangular vertex is identified. For graphical mode, clicking anywhere in the rectangle is a successful click. In text mode, typing in any of the characters on the outline cells of the rectangular border is considered to be successful. Example: If pass characters are the same ie. pair is >, >. Thus > forms one vertex of the rectangle while its mirror character in the diagonal quadrant, namely, forms the diagonal rectangular vertex. Thus the rectangle is >, S,, -. In the graphical mode, successful click is anywhere in the rectangle is a successful click. In the text mode, typing in any of the characters that lie on the border of the rectangle, namely, >, e, }, d, X, R, b, S, L, a,, M, l, y, {, -, 0, [. Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical (M.Kameswara Rao)

4 166 ISSN: Illustration : To illustrate the login process, let us follow an example where the user s password is L9sL. The four pass-character pairs for this password are L9, 9s, sl and LL. The login procedure consists of the following four steps and is also shown below. 1)The user s first pass-character pair is L, 9 and then identifies the rectangle formed by L, 9 as rectangular vertices and their mirror characters with respect to X axis, namely, a, r as the other rectangular vertices. Thus in graphical mode, the user can click on any of the cells that are part of the rectangle. In text mode, the border of the rectangle namely, L, 9, r,a can be entered.. Figure 2 represents the rectangle for this pair of pass-characters. Figure 2 Pass-characters form horizontal line 2) The user s second pass-character pair is 9, s and identifies the rectangle formed by vertices 9, s and their mirror characters wth respect to Y-axis, namely, i, + as the other rectangle vertices. The user can click anywhere within that rectangle or type in any of the characters 9, o, f, I, ),,, +, V, Z, s, -, R. Figure 3 highlights the cells that represent the clickable area for this pair of pass-characters. IJINS Vol. 1, No. 3, August 2012 : Figure 3 Pass characters form vertical line 3) The third pass-character pair is s, L and then clicks on any of the cells in the rectangle grid formed by s, L and their diagonal rectangular vertices are t, 9. Thus the user can click anywhere in the indicated rectangle in Figure 4. The user can also type in any of the characters L, D, 9, R, -, s, 8, t, B and S.

5 IJINS ISSN: Figure 4 Pass characters form diagonal rectangular vertices 4) The user s fourth pass-character pair is L, L. The rectangle is formed by the diagonal vertices L and its mirror character in the diagonal quadrant 0. The user can click anywhere in the rectangle L, a, 0, [ as indicated in Figure 5. The user could also type in any of the characters a, u, r, }, Q, g, Y, 0, [, ~, I, f, o, 9, D, L in text mode. Figure 5 Same character Pass-character pair 3.2. TricolourPairPasswordChar(TPPC) scheme TPPC scheme use the tricolour version of the basic character set where each character appears in three colors: red, green and blue randomly spaced in a 17x17 grid. As in the PPC scheme, the pass-characters are examined one pair at a time, starting with the first pass-character and shifting to the right until the last pass-character in the password becomes the first pass- character in a pass-character pair. Each pass-character pair is first converted into the mapped character pair and the rules of the PPC scheme and the special case rules of TPPC are applied to which results in the rectangle. Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical (M.Kameswara Rao)

6 168 ISSN: Figure 6 Tricolor character set Rule: The first pass-character in the pair is replaced with the same character in one of the other two possible colours. The second pass-character in the pair is unchanged. This results in two possible pairs that the user can select from. The rules of the original PPC scheme are applied to the mapped pair applying the special case rules where applicable. The clickable areas and characters that can be typed in are derived. Special Cases: Case 1: When the characters in the mapped pair form a vertical line on the 9th column, any of the characters including and in between the mapped characters can be clicked upon or typed in. Case 2: When the mapped characters form a horizontal line on the 9th row, any of the characters including and in between the mapped characters can be clicked upon or typed in. Case 3: When one of the characters in the mapped pair are diagonal vertices of a rectangle then Rule 3 of PPC scheme is applied. Case 4 : When both pass characters are same and lie at the center of the grid, any of the characters that lie on the cells that border the grid can be clicked or typed in. Case 5: When both pass-characters are the same and lie on the 9th row/column then the mirror character with respect to Y axis / X axis is determined and the any of the characters that lie on or in between these two characters can be clicked on or typed in. Illustration: Let us consider a scenario where Alice s password is 5 g R r1 g <r. We process the pass-characters pairwise as described below. 1) For the first pass-character pair 5 g R r we replace 5 in green with 5 in red or blue and leave R r unchanged. In other words, the user can select either of 5 r R r or 5 b R r. The user can then input in either text or graphical mode by applying the rules of the PPC scheme and special cases of TPPC scheme to the selected pair. 2) The second pair is R r1 g and in this case the user can choose either R g 1 r or R b 1 r and input either text or graphical mode by applying the rules of PPC and special cases of TPPC scheme to the selected pair. IJINS Vol. 1, No. 3, August 2012 :

7 IJINS ISSN: ) Next the pair 1 g <r is considered and Alice can choose one among the two possible pairs of 1 r < r and 1 b < r as the selected pair. The PPC rules and special cases of TPPC are applied to the selected pair. 4) The pair < r 5 g is processed and Alice can choose between < g 5 g and < b 5 g. The rules of PPC and the special cases of TPPC are applied to the selected pair. 4. ANALYSIS OF PROPOSED SCHEMES An experiment was conducted involving 20 Computer Science graduate students to study memorability, usability and login times for PPC and TPPC schemes. It was found that the average login times for the PPC scheme consisting of 4 character passwords, 5 character passwords and 6 character passwords were 28.4, 39.6 and 47.3 respectively. The average login times for the TPPC scheme for the same lengths of passwords were 30.4, 44.1 and 54.3 respectively. This clearly demonstrates that the average login times increase as the password length increases in both schemes. Further, the login times for the TPPC scheme are higher than the PPC scheme for the same password length. It was also found that 64% of the participants in the study found the rules for the TPPC scheme to be difficult to apply than the PPC scheme. Memorability of the passwords in TPPC scheme decreased with increase in password length. Observers of the password being input could not guess the text-graphical password in each case. The traditional text-based password scheme and the proposed PPC and TPPC schemes are analyzed with respect to security, usability, memorability and social engineering aspects and a summary is presented in Table 1. Table 1. Comparison of authentication schemes. Scheme Usability Memorability Security Traditional Textbased User familiarity with the interface. Hard to remember multiple and strong passwords. Reduced security due to weak passwords and password sharing. Prone to Dictionary, Brute force, Shoulder surfing, and Spyware attacks. Password space 94 n (n=password length). PPC User familiarity with text interface. User training required for graphical interface. Longer login time than above scheme Advantages of graphical passwords Resistant to Shoulder surfing and Spyware attacks. Brute force and Random click attacks are avoided due to login screen reset. Password space 94 n. TPPC User familiarity with text interface. User training required for graphical interface. Longer training and login times than above two schemes Users have to remember coloured password combinations. Rules more complex than above schemes. Resistant to Shoulder surfing and Spyware attacks. Brute force and Random click attacks are difficult due to increased password space and login screen reset. Password space 282 n. 5. CONCLUSIONS In the present work, we have proposed two text-graphical authentication schemes that are shouldersurfing and spyware resistant as the pass-characters are mapped into password regions that do not indicate a relation between the pass-characters and the input characters. The password space provided by the PPC scheme is as much as that offered by conventional password systems while it is greatly enhanced in the TPPC scheme due to the use of the same 96-character set in three colours. In the two schemes, when the number of login attempts exceeds a certain threshold, say 3, the login screen is reset and no indication is given to the user if some of the characters are correctly input thereby deterring Brute force and Random click attacks. Brute force attack in TPPC scheme is significantly more difficult due to the increased password space. Based on the experimental work, it can be concluded that the TPPC scheme rules are complex and therefore harder to remember than the PPC scheme even though Brute force attack was more difficult in TPPC scheme due to the increased password space. The login times were longer for the TPPC scheme. TPPC scheme is more secure than the traditional textual password scheme and the PPC scheme which use only 96 character set. Observers could not determine any relationship between the password being input and the actual password Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical (M.Kameswara Rao)

8 170 ISSN: therefore it can be concluded that shoulder-surfing and spyware attacks are deflected in both schemes. The password space may be increased further by using more than three colour character sets based upon user choice. The larger grid in multi-color pairwise schemes would require scrolling on mobile phones and personal digital assistants. The extension of the proposed schemes to hand-held mobile devices can be explored as future work. Automated guided training and password validation of the schemes can be taken up. The above PPC scheme can be modified to represent the same character rotated by 90, 180 and 270 degrees respectively in place of the original orientation of the character as future work. REFERENCES [1] E. Shephard, Recognition memory for words,sentences, and pictures, Journal of Verbal Learning and Verbal Behavior, 6, pp , [2] A. Jermyn, et al., The design and analysis of graphical passwords, Proceedings of the 8th USENIX Security Symposium, August, Washington, D.C., USA, [3] X. Suo, et al., Graphical passwords: A survey., Proceedings of 21st Annual Computer Security Applications Conference., pp , [4] S. Chiasson, et al., Graphical Password Authentication Using Cued Click Points, ESORICS, September, Dresden,Germany, pp , [5] M. D. Hafiz, et al., Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique, Proceedings of second Asia International Conference on Modelling & Simulation, IEEE Computer Society, pp , [6] A. H. Lashkari, A Survey On Usability And Security Features In Graphical User Authentication Algorithms, IJCSNS International Journal of Computer Science and Network Security, 9, Korea,pp , [7] R. Biddle, et al., Graphical Passwords: Learning from the First Twelve Years, ACM Computing Survey, issue 44(4), [8] R. Dhamija and A. Perrig, Deja vu: A user study using images for authentication, Proceedings of 9th USENIX Security Symposium, [9] W. Jansen, Authenticating Mobile Device Users Through Image Selection, Data Security, [10] T. Takada and H. Koike, Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images, Human-Computer Interaction with Mobile Devices and Services, 2795, Springer-Verlag GmbH, pp , [11] Passfaces Corporation, The science behind Passfaces, White paper, Available at July [12] J. Goldberg, Doodling Our Way to Better Authentication, Proceedings of Human Factors in Computing Systems (CHI), Minneapolis, Minnesota, USA. [13] A. F. Syukri, et al., A User Identification System Using Signature Written With Mouse, Third Australasian Conference on Information Security and Privacy (ACISP), Springer-Verlag Lecture Notes in Computer Science, pp , 1998 [14] [15] S. Wiedenbeck, et al., PassPoints: Design and longitudinal evaluation of a graphical password system, International Journal of Human-Computer Studies, 63, pp , [16] M. Boroditsky. Passlogix password schemes. [17] AH Lashkari, et al., Shoulder Surfing attack in graphical password authentication, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 2, 2009 [18] S. Man, et al,, A shoulder-surfing resistant graphical password scheme WIW, Proceedings of International Conference on Security and Management, Las Vegas, pp , [19] S. Wiedenbeck, et al., Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme, Proceedings of AVI, pp , Venezia, Italy, ACM Press, [20] B. Malek et al., Novel shoulder-surfing resistant haptic-based graphical password. EuroHaptics 06, [21] M. Kumar, et al., Reducing Shoulder-surfing by Using Gaze-based Password Entry, in Symposium On Usable Privacy and Security (SOUPS). 2007: Pittsburgh, PA, USA, [22] H. Zhao and X. Li., S3PAS:A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme, AINAW 07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, vol. 2, pp , [23] A. Forget, et al., Shoulder-Surfing Resistance with Eye-Gaze Entry in Cued-Recall Graphical Passwords, Proceedings of CHI 2010, Atlanta, Georgia, USA, April 10 15, [24] ]. H. Gao, et al., A New Graphical Password Scheme Resistant to Shoulder-Surfing, International Conference on Cyberworlds. 2010, IEEE: Singapore pp , IJINS Vol. 1, No. 3, August 2012 :

Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2

Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India mail2maruthi03@gmail.com

More information

ENHANCEMENT OF SECURITY FEATURE IN GRAPHICAL PASSWORD AUTHENTICATION

ENHANCEMENT OF SECURITY FEATURE IN GRAPHICAL PASSWORD AUTHENTICATION International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 2, Jun 2013, 395-402 TJPRC Pvt. Ltd. ENHANCEMENT OF SECURITY FEATURE IN

More information

Recall Based Authentication System- An Overview

Recall Based Authentication System- An Overview Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer

More information

Authentication schemes for session password using color and special characters

Authentication schemes for session password using color and special characters Authentication schemes for session password using color and special characters Rohit Jagtap1, a, Vaibhav Ahirrao2,b Vinayak Kadam3,c Nilesh Aher4 1.Department of Computer Engineering, 2 Department of Computer

More information

Graphical User Authentication Using Random Codes

Graphical User Authentication Using Random Codes Graphical User Authentication Using Random Codes Mr.D.S.Gawande 1, Manisha P. Thote 2, Madhavi M. Jangam 3, Payal P. Khonde 4, Payal R. Katre 5, Rohini V. Tiwade 6 1Assistant Professor, Computer Science

More information

COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES

COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method

A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method Salim Istyaq, Khalid Saifullah Assistant Professor, Dept. of Computer Engineering, EES, University Polytechnic, Faculty

More information

3LAS (Three Level Authentication Scheme)

3LAS (Three Level Authentication Scheme) 3LAS (Three Level Authentication Scheme) Kunal Mulwani 1, Saurabh Naik 2, Navinkumar Gurnani 3, Dr. Nupur Giri 4, Prof. Sharmila Sengupta 5 1, 2,3,4,5 Vivekanand Education Society's Institute of Technology,

More information

MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION

MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T 1, Rajesh I 2, Kirupa Rani D 3 1 PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2 Associate

More information

Innovative Graphical Passwords using Sequencing and Shuffling Together

Innovative Graphical Passwords using Sequencing and Shuffling Together Innovative Graphical Passwords using Sequencing and Shuffling Together Rashmi Wable 1, Dr.Suhas Raut 2 N.K. Orchid College of Engineering and Technology, Solapur ABSTRACT Graphical authentication technology

More information

Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review

Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review Australian Journal of Basic and Applied Sciences, 7(4): 688-695, 2013 ISSN 1991-8178 Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review Mohd Afizi Bin Mohd Shukran, Mohd

More information

Usable Privacy and Security, Fall 2011 Nov. 10, 2011

Usable Privacy and Security, Fall 2011 Nov. 10, 2011 Usable Privacy and Security, Fall 2011 Nov. 10, 2011 YoungSeok Yoon (youngseok@cs.cmu.edu) Institute for Software Research School of Computer Science Carnegie Mellon University picture/photo based vs.

More information

Cued Click Point Technique for Graphical Password Authentication

Cued Click Point Technique for Graphical Password Authentication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION

NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION P.Kiruthika R.Tamilarasi Department of Computer Applications, Dr.Mahalingam College Of Engineering and Technology,

More information

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information

Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm

Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm Siddheshwar A. Suratkar Rahul A. Udgirkar Pratik D. Kale Amit A. Shelke Mohsin H. Shaikh Prof. D. C. Dhanwani Prof. CSE,

More information

A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES

A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES , pp.-04-08. Available online at http://www.bioinfo.in/contents.php?id=219 A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES ASHWINI FULKAR*, SUCHITA SAWLA, ZUBIN KHAN

More information

A New Graphical Password: Combination of Recall & Recognition Based Approach

A New Graphical Password: Combination of Recall & Recognition Based Approach A New Graphical Password: Combination of Recall & Recognition Based Approach Md. Asraful Haque, Babbar Imam International Science Index, Computer and Information Engineering waset.org/publication/9997703

More information

A Hybrid Password Authentication Scheme Based on Shape and Text

A Hybrid Password Authentication Scheme Based on Shape and Text JOURNAL OF COMPUTERS, VOL. 5, NO. 5, MAY 2010 765 A Hybrid Password Authentication Scheme Based on Shape and Text Ziran Zheng School of Management & Economics Shandong Normal University, Jinan, China Email:

More information

Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication

Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication Shah Zaman Nizamani Waqas Ali Sahito Shafique Awan Department of IT Department of IT Department of Computer

More information

USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS

USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS Sreelatha Malempati Dept. of Computer Science & Engineering R.V.R. & J.C. College of Engineering Chowdavaram, Guntur, A.P lathamoturi@rediffmail.com

More information

Graphical Password to Increase the Capacity of Alphanumeric Password

Graphical Password to Increase the Capacity of Alphanumeric Password Graphical Password to Increase the Capacity of Alphanumeric Password Gaddam Ramu Computer Science & Engineering. S.R.Engineering College, Warangal, Telangana, India. Goje Roopa(Asst.Prof) Computer Science

More information

Presented By: Miss Samya Ashraf Want Student ID

Presented By: Miss Samya Ashraf Want Student ID Paper: Haichang Gao, Xiyang Liu, Sidong Wang and Honggang Liu, Ruyi Dai, Design and Analysis of a Graphical Password Scheme, Fourth International Conference on Innovative Computing, Information and Control,

More information

Graphical User Authentication

Graphical User Authentication Graphical User Authentication LALZIRTIRA (211CS2058) under the guidance of Prof. SANJAY KUMAR JENA Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela 769

More information

An Ancient Indian Board Game as a Tool for Authentication

An Ancient Indian Board Game as a Tool for Authentication An Ancient Indian Board Game as a Tool for Authentication Sreelatha Malempati 1 and Shashi Mogalla 2 1 Department of Computer Science and Engineering RVR & JC College of Engineering, Guntur, A.P. e-mail:

More information

Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme

Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme 1 Prof. S. K. Sonkar, 2 Prof. R. L. Paikrao Computer Engineering Dept. Amrutvahini College of engineering Sangamner,

More information

A Survey on Recall-Based Graphical User Authentications Algorithms

A Survey on Recall-Based Graphical User Authentications Algorithms A Survey on Recall-Based Graphical User Authentications Algorithms D.Aarthi 1, Dr.K.Elangovan 2 1 School of Computer Science and Engineering, Bharathidasan University, Trichy, India 2 School of Computer

More information

A Survey on Different Graphical Password Authentication Techniques

A Survey on Different Graphical Password Authentication Techniques A Survey on Different Graphical Password Authentication Techniques Saranya Ramanan 1, Bindhu J S 2 PG scholar, Department of Computer Science, College of Engineering, Perumon, Kerala, India 1 Associate

More information

MIBA: Multitouch Image-Based Authentication on Smartphones

MIBA: Multitouch Image-Based Authentication on Smartphones MIBA: Multitouch Image-Based Authentication on Smartphones Daniel Ritter daniel.ritter@uni-ulm.de Florian Schaub florian.schaub@uni-ulm.de Marcel Walch marcel.walch@uni-ulm.de Michael Weber michael.weber@uni-ulm.de

More information

A Multi-Grid Graphical Password Scheme

A Multi-Grid Graphical Password Scheme A Multi-Grid Graphical Password Scheme Konstantinos CHALKIAS, Anastasios ALEXIADIS, George STEPHANIDES Dept. of Applied Informatics, Macedonia University, 156 Egnatia str., 540 06 Thessaloniki, Greece

More information

A Text based Authentication Scheme for Improving Security of Textual Passwords

A Text based Authentication Scheme for Improving Security of Textual Passwords A Text based Authentication Scheme for Improving Security of Textual Passwords Shah Zaman Nizamani Department of Information Technology Quaid-e-Awam University of Engineering, Science & Technology, Pakistan

More information

Graphical Password Authentication: Methods and Schemes

Graphical Password Authentication: Methods and Schemes Graphical Password Authentication: Methods and Schemes Geeta M. Rane, Student (BE) of Computer Science and Engineering, Shri Sant Gadge Baba College of Engineering & Technology, Bhusawal, North Maharashtra

More information

Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique

Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique Second Asia International Conference on Modelling & Simulation Towards Identifying Usability and Security Features of Graphical Password in Knowledge Based Authentication Technique Muhammad Daniel Hafiz

More information

Graphical Password or Graphical User Authentication as Effective Password Provider

Graphical Password or Graphical User Authentication as Effective Password Provider www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 9 September 2013 Page No. 2765-2769 Graphical Password or Graphical User Authentication as Effective

More information

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Chippy.T chippyrevathy@gmail.com Dhanalakshmi Srinivasan Engineering College R.Nagendran nanonagendran@gmail.com

More information

Graphical password authentication using Pass faces

Graphical password authentication using Pass faces RESEARCH ARTICLE OPEN ACCESS Graphical password authentication using Pass faces Ms Grinal Tuscano*, Aakriti Tulasyan**, Akshata Shetty**, Malvina Rumao**, Aishwarya Shetty ** *(Department of Information

More information

M.Ashwini 1,K.C.Sreedhar 2

M.Ashwini 1,K.C.Sreedhar 2 Improved Persuasive Cued Click Points For Knowledge-Based Authentication M.Ashwini 1,K.C.Sreedhar 2 1 M.Tech Student, Dept of CSE, QIS College of Engineering & technology, Ongole, Prakasam Dist, A.P, India

More information

CARP: CAPTCHA as A Graphical Password Based Authentication Scheme

CARP: CAPTCHA as A Graphical Password Based Authentication Scheme CARP: CAPTCHA as A Graphical Password Based Authentication Scheme Shraddha S. Banne 1, Prof. Kishor N. Shedge 2 Student, Dept. of Computer Engg, S.V.I.T, Chincholi, Sinnar, Nashik, India 1 Assistant Professor,

More information

SHOULDER SURFING ATTACK PREVENTION USING COLOR PASS METHOD

SHOULDER SURFING ATTACK PREVENTION USING COLOR PASS METHOD SHOULDER SURFING ATTACK PREVENTION USING COLOR PASS METHOD Bagade Om, Sonawane Anuja, Patil Akash, Patil Yogita, Maurya Jagruti Department of Computer Engineering Shram sadhana trust s college of engineering

More information

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Abdul Rasheed. Sk 1 Asst. Professor Narasaraopeta Engineering College, Narasaraopet. rasheed4321@gmail.com

More information

Simple Text Based Colour Shuffling Graphical Password Scheme

Simple Text Based Colour Shuffling Graphical Password Scheme Simple Text Based Colour Shuffling Graphical Password Scheme Nikita Parab 1, Ketan Gawde 2, Anshumaan Nalluri 3 1,2,3 Information Technology Dept., Universal College Of Engineering Vasai India, Abstract

More information

An image edge based approach for image password encryption

An image edge based approach for image password encryption SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:5733 5745 Published online 16 January 2017 in Wiley Online Library (wileyonlinelibrary.com)..1732 RESEARCH ARTICLE An image edge based

More information

A GRAPHICAL PASSWORD BASED AUTHENTICATION BASED SYSTEM FOR MOBILE DEVICES

A GRAPHICAL PASSWORD BASED AUTHENTICATION BASED SYSTEM FOR MOBILE DEVICES Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS

DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS http:// DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS Chalichima Harshitha 1, Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor

More information

Image Password Based Authentication in an Android System

Image Password Based Authentication in an Android System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS

USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS Dr. Mohammed A. Fadhil Al-Husainy Raghda Ahmed Malih Department of Computer Science, Faculty of Information Technology, Middle

More information

Authentication Using Grid-Based Authentication Scheme and Graphical Password

Authentication Using Grid-Based Authentication Scheme and Graphical Password Authentication Using Grid-Based Authentication Scheme and Graphical Password Vijayshri D. Vaidya 1 Department of Computer engineering SND COE & RC Yeola, India Imaran R. Shaikh 2 Department of Computer

More information

International Journal of Pure and Applied Sciences and Technology

International Journal of Pure and Applied Sciences and Technology Int. J. Pure Appl. Sci. Technol., 1(2) (2010), pp. 60-66 International Journal of Pure and Applied Sciences and Technology ISSN 2229-6107 Available online at www.ijopaasat.in Research Paper Security Analysis

More information

A PIN Entry Scheme Resistant to Recording-based Shoulder-Surfing

A PIN Entry Scheme Resistant to Recording-based Shoulder-Surfing 2009 Third International Conference on Emerging Security Information, Systems and Technologies A PIN Entry Scheme Resistant to Recording-based Shoulder-Surfing Peipei Shi, Bo Zhu, and Amr Youssef Concordia

More information

International Journal of Advances in Engineering Research

International Journal of Advances in Engineering Research GRAPHICAL PASSWORD AUTHENTICATION SYSTEM WITH INTEGRATED SOUND SIGNATURE 1 Anu Singh, 2 Kiran Kshirsagar, 3 Lipti Pradhan 1 Student, Department of Computer Engineering, Pune University 2 Student, Department

More information

A SURVEY ON IMPROVEMENT OF A PIN- ENTRYMETHOD RESILIENT TO SHOULDER- SURFING ANDRECORDING ATTACKS

A SURVEY ON IMPROVEMENT OF A PIN- ENTRYMETHOD RESILIENT TO SHOULDER- SURFING ANDRECORDING ATTACKS A SURVEY ON IMPROVEMENT OF A PIN- ENTRYMETHOD RESILIENT TO SHOULDER- SURFING ANDRECORDING ATTACKS MAYUR SHINDE 1, ADITYA KULKARNI 2, HRUSHIKESH DOLAS 3,PALLAVI TEKE 4 1 Dept. of Computer Engineering, Sinhgad

More information

ChoCD: Usable and Secure Graphical Password Authentication Scheme

ChoCD: Usable and Secure Graphical Password Authentication Scheme Indian Journal of Science and Technology, Vol 10(4), DOI: 10.17485/ijst/2017/v10i4/110885, January 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 ChoCD: Usable and Secure Graphical Password Authentication

More information

Security in Graphical Authentication

Security in Graphical Authentication Security in Graphical Authentication Robert G. Rittenhouse 1, Junaid Ahsenali Chaudry 2 and Malrey Lee 3 1 Keimyung Adams College, Keimyung University, Daegu, Republic of Korea 2 Department of Computer

More information

Enhancing CAPTCHA based Image Authentication for ID and Password

Enhancing CAPTCHA based Image Authentication for  ID and Password ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Enhancing CAPTCHA based Image Authentication for E-mail ID and Password 1MACHARLA

More information

A Secure Graphical Password Authentication System

A Secure Graphical Password Authentication System International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 12, Number 2 (2016), pp. 197-201 Research India Publications http://www.ripublication.com A Secure Graphical Password

More information

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: Volume 14 Issue 2 APRIL 2015

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: Volume 14 Issue 2 APRIL 2015 Persuasive Cued Click Point Authentication Mechanism with Sound Signature MOUNESHWAR KANAMADI 1,AMIT SAWANT 2,JAMDADE MARUTI 3,4 MEGHARANI BAMBUGADE, 5 ROKADE KOMAL 1 Department of CSE, Ashokrao Mane Group

More information

Design & Implementation of Online Security Using Graphical Password Systems Using Captcha Technique

Design & Implementation of Online Security Using Graphical Password Systems Using Captcha Technique Design & Implementation of Online Security Using Graphical Password Systems Using Captcha Technique ABSTRACT: Many security primitives are based on hard mathematical problems. Using hard AI problems for

More information

KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS

KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS http:// KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS G Anil Kumar 1, K Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor (CSE), Nalanda Institute of Engineering

More information

SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD

SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD Kruthi K 1, Kumuda B G 2, Nandhini N V 3, Mrs. R.Anitha 4 (Associate Professor) 1, 2, 3, 4 Department of Computer Science and Engineering, The National Institute

More information

KNOWLEDGE BASED AUTHENTICATION MECHANISM FOR SECURED DATA TRANSFER

KNOWLEDGE BASED AUTHENTICATION MECHANISM FOR SECURED DATA TRANSFER KNOWLEDGE BASED AUTHENTICATION MECHANISM FOR SECURED DATA TRANSFER R.T.Narmadha1, R.T.Nivetha2, M.Roobia Fathima 2, P.Vijayalakshmi 2 1 Department of Information Technology, Info Institute of Engineering,

More information

A new algorithm on Graphical User Authentication (GUA) based on multi-line grids

A new algorithm on Graphical User Authentication (GUA) based on multi-line grids University of Malaya From the SelectedWorks of Abdullah Gani 2010 A new algorithm on Graphical User Authentication (GUA) based on multi-line grids Abdullah Gani, University of Malaya Available at: https://works.bepress.com/abdullah_gani/2/

More information

A NEW ALGORITHM FOR GRAPHICAL USER AUTHENTICATION BASED ON ROTATION AND RESIZING ARASH HABIBI LASHKARI

A NEW ALGORITHM FOR GRAPHICAL USER AUTHENTICATION BASED ON ROTATION AND RESIZING ARASH HABIBI LASHKARI A NEW ALGORITHM FOR GRAPHICAL USER AUTHENTICATION BASED ON ROTATION AND RESIZING ARASH HABIBI LASHKARI A THESIS SUBMITTED FOR THE MASTER OF COMPUTER SCIENCE IN DATA COMMUNICATION & COMPUTER NETWORKING

More information

Address for Correspondence 1 Associate Professor department o f Computer Engineering BVUCOE, Pune

Address for Correspondence 1 Associate Professor department o f Computer Engineering BVUCOE, Pune Research Article THREE DIMENSIONAL VIRTUAL ENVIRONMENT FOR SECURED AND RELIABLE AUTHENTICATION 1 Gauri Rao, 2 Dr. S.H. Patil Address for Correspondence 1 Associate Professor department o f Computer Engineering

More information

MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE

MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE P.Shyam Sunder 1, Ballikonda Sai Chaitanya 2, D.Vijay Kumar 3, P.Satya Shekar Varma 4 1,2,4 Department of Computer Science

More information

Survey on Various Techniques of User Authentication and Graphical Password

Survey on Various Techniques of User Authentication and Graphical Password Survey on Various Techniques of User Authentication and Graphical Password Miss. Saraswati B. Sahu #1, Associate Prof. Angad Singh *2 1(M. Tech Scholar, Dept. of Information Technology, NIIST, Bhopal,

More information

A Tabular Steganography Scheme for Graphical Password Authentication

A Tabular Steganography Scheme for Graphical Password Authentication UDC 004.738.5, DOI:10.2298/CSIS081223028L A Tabular Steganography Scheme for Graphical Password Authentication Tsung-Hung Lin 1, Cheng-Chi Lee 2,4, Chwei-Shyong Tsai 3, and Shin-Dong Guo 4 1 Department

More information

A Novel Graphical Password Authentication Scheme

A Novel Graphical Password Authentication Scheme A Novel Graphical Password Authentication Scheme 1 L. Lakshmi reddy & 2 J. Nagamuneiah 1 M.Tech (CSE), CREC, Tirupati, Email Id: lakshmireddy49@gmail.com 2 Associate professor, CREC, Tirupati, Email Id:

More information

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

The Design and Implementation of Background Pass-Go Scheme Towards Security Threats

The Design and Implementation of Background Pass-Go Scheme Towards Security Threats The Design and Implementation of Background Pass-Go Scheme Towards Security Threats L. Y. Por 1, X. T. Lim 2, M.T. Su 3, F. Kianoush 4 Faculty of Computer Science and Information Technology, University

More information

Graphical Password Authentication with Cloud Securing Method

Graphical Password Authentication with Cloud Securing Method 2015; 2(3): 763-768 IJMRD 2015; 2(3): 763-768 www.allsubjectjournal.com Received: 10-03-2015 Accepted: 25-03-2015 e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Pawar Poonam A Gayake Nalini B

More information

Graphical Passwords: Learning from the First Generation

Graphical Passwords: Learning from the First Generation TR-09-09: GRAPHICAL PASSWORDS 1 Graphical Passwords: Learning from the First Generation Robert Biddle, Sonia Chiasson, P.C. van Oorschot Abstract Numerous graphical password schemes have recently been

More information

Pixel Value Graphical Password Scheme: Fake Passpix Attempt on Hexadecimal Password Style

Pixel Value Graphical Password Scheme: Fake Passpix Attempt on Hexadecimal Password Style International Journal of Information and Communication Sciences 2018; 3(3): 104-109 http://www.sciencepublishinggroup.com/j/ijics doi: 10.11648/j.ijics.20180303.14 ISSN: 2575-1700 (Print); ISSN: 2575-1719

More information

Graphical Passwords: Learning from the First Twelve Years

Graphical Passwords: Learning from the First Twelve Years Graphical Passwords: Learning from the First Twelve Years Robert Biddle, Sonia Chiasson, P.C. van Oorschot School of Computer Science Carleton University, Ottawa, Canada robert_biddle@carleton.ca, chiasson@scs.carleton.ca,

More information

A Survey on Graphical Passwords in Providing Security

A Survey on Graphical Passwords in Providing Security A Survey on Graphical Passwords in Providing Security Mrs. Anuradha. V #, Mr.M.Nagesh *, Mr.N. Vijaya sunder sagar # # M.Tech., Dept. of CSE, Ashoka Institute of Engineering & Technology, JNTU Hyderabad

More information

Ray s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

Ray s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices Ray s Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices Partha Pratim Ray Department of Computer Science and Engineering, Surendra Institute of Engineering and Management,

More information

3D PASSWORD AUTHENTICATION FOR WEB SECURITY

3D PASSWORD AUTHENTICATION FOR WEB SECURITY 3D PASSWORD AUTHENTICATION FOR WEB SECURITY Sahana R.Gadagkar 1, Aditya Pawaskar 2, Mrs. Ranjeeta B. Pandhare 3 1,2 Department of Computer Science & Engineering, KIT s College of Engineering, Kolhapur,

More information

Passwords. EJ Jung. slide 1

Passwords. EJ Jung. slide 1 Passwords EJ Jung slide 1 Basic Problem? How do you prove to someone that you are who you claim to be? Any system with access control must solve this problem slide 2 Many Ways to Prove Who You Are What

More information

A Comparison of Perceived and Real Shoulder-surfing Risks between Alphanumeric and Graphical Passwords

A Comparison of Perceived and Real Shoulder-surfing Risks between Alphanumeric and Graphical Passwords A Comparison of Perceived and Real Shoulder-surfing Risks between Alphanumeric and Graphical Passwords Furkan Tari Dept. of Information Systems, UMBC 1000 Hilltop Circle Baltimore, MD 21250 +1 (410) 455

More information

CARP-A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS

CARP-A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.12

More information

Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones

Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones Yuxin Meng 1, Wenjuan Li 2,andLam-ForKwok 1 1 Department of Computer Science, City University of Hong Kong, Hong Kong,

More information

Randomized Image Passwords and A QR Code based Circumnavigation Mechanism for Secure Authentication

Randomized Image Passwords and A QR Code based Circumnavigation Mechanism for Secure Authentication IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 04 September 2015 ISSN (online): 2349-6010 Randomized Image Passwords and A QR Code based Circumnavigation Mechanism

More information

Information Security Engineering

Information Security Engineering Information Security Engineering 2018.10.29 Huiping Sun( ) sunhp@ss.pku.edu.cn Graphical Password Human Computation 回顾 1 2 3 4 Graphical Password Reading Paper 回顾 Introduction 心理学基础 Recall Recognition

More information

A Novel Approach for Software Implementation of Graphical Authentication Methodology

A Novel Approach for Software Implementation of Graphical Authentication Methodology A Novel Approach for Software Implementation of Graphical Authentication Methodology Murtaza Alamshah School Of Information Technology Vellore Institute of Technology Vellore, India murtazaalamshah@gmail.com

More information

A Survey On Resisting Shoulder Surfing Attack Using Graphical. password

A Survey On Resisting Shoulder Surfing Attack Using Graphical. password A Survey On Resisting Shoulder Surfing Attack Using Graphical Password Mayuri Gawandi 1,Saloni Pate 2,Pokharkar Snehal 3,Prof.Said S.K. 4 Abstract Now a days India is moving towards a digital India while

More information

Captcha as Graphical Password- Based AI Problems

Captcha as Graphical Password- Based AI Problems Captcha as Graphical Password- Based on Hard AI Problems S.Navaneethakrishnan, P.Kumar Student, Assistant professor (CSE) Nandha College Of Technology,Erode snkrish1990@gmail.com csekumar@gmail.com ABSTRACT:

More information

Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices

Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices Int'l Conf. Security and Management SAM'17 273 Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices Joshua Sherfield 1, Cheryl V. Hinds 2 1 Lawrence

More information

In this unit we are continuing our discussion of IT security measures.

In this unit we are continuing our discussion of IT security measures. 1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems

More information

Issues, Threats and Future Trend for GSP

Issues, Threats and Future Trend for GSP Issues, Threats and Future Trend for GSP L. Y. POR 1, X. T. LIM 2 Faculty of Computer Science and Information Technology, University of Malaya, 50603, Kuala Lumpur, MALAYSIA porlip@um.edu.my 1, emilylim1986@hotmail.com

More information

Captcha as Graphical Passwords (Security Primitive Based On Hard Ai Problems)

Captcha as Graphical Passwords (Security Primitive Based On Hard Ai Problems) RESEARCH ARTICLE OPEN ACCESS Captcha as Graphical Passwords (Security Primitive Based On Hard Ai Problems) 1. Valusani Shrenika, M.Tech student, 2 Mr.D.Uma Vishweshwar,, Hyderabad Asst.Professor, Abstract

More information

A VISUAL DICTIONARY ATTACK ON PICTURE PASSWORDS. Amir Sadovnik and Tsuhan Chen. Department of Electrical and Computer Engineering, Cornell University

A VISUAL DICTIONARY ATTACK ON PICTURE PASSWORDS. Amir Sadovnik and Tsuhan Chen. Department of Electrical and Computer Engineering, Cornell University A VISUAL DICTIONARY ATTACK ON PICTURE PASSWORDS Amir Sadovnik and Tsuhan Chen Department of Electrical and Computer Engineering, Cornell University ABSTRACT Microsoft s Picture Password provides a method

More information

Graphical Password Authentication using Images Sequence

Graphical Password Authentication using Images Sequence Graphical Password Authentication using Images Sequence Muhammad Ahsan 1, Yugang Li 2 1Student, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China 2School of Computer

More information

Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points

Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 2 (May. - Jun. 2013), PP 39-46 Implementation of Knowledge Based Authentication System Using Persuasive

More information

AN IMPROVED MAP BASED GRAPHICAL ANDROID AUTHENTICATION SYSTEM

AN IMPROVED MAP BASED GRAPHICAL ANDROID AUTHENTICATION SYSTEM AN IMPROVED MAP BASED GRAPHICAL ANDROID AUTHENTICATION SYSTEM Safiyanu Ahmad (ahmadsafiyanu100@gmail.com) 1 ; Souley Boukari (bsouley2001@yahoo.com) 2 ; Samson Henry Dogo (dogojankasa@gmail.com) 1 and

More information

A Survey on Recognition-Based Graphical User Authentication Algorithms

A Survey on Recognition-Based Graphical User Authentication Algorithms A Survey on Recognition-Based Graphical User Authentication Algorithms Farnaz Towhidi Centre for Advanced Software Engineering, University Technology Malaysia Kuala Lumpur, Malaysia farnaz.towhidi@gmail.com

More information

Graphical Password Using Captcha

Graphical Password Using Captcha International Journal of Advances in Applied Sciences (IJAAS) Vol. 5, No. 2, June 2016, pp. 94~100 ISSN: 2252-8814 94 Graphical Password Using Captcha Y. Chandra Sekhar Reddy, M. Venkateswara Rao, M. Kameswara

More information

Graphical Authentication System

Graphical Authentication System Graphical Authentication System A Sivasankar Reddy 1, M Kusuma 2 1 Student, Dept. of MCA, EAIMS 2 Professor, Dept. of MCA, EAIMS, Tirupati, A.P. Abstract- This evolution brings great convenience but also

More information

Captcha as Textual Passwords with Click Points to Protect Information

Captcha as Textual Passwords with Click Points to Protect Information Captcha as Textual Passwords with Click Points to Protect Information Sandeep Kumar Vengala Computer Science & Engineering. S.R.Engineering College, Warangal, Telangana, India. Goje Roopa(Asst.Prof) Computer

More information

User Authentication Protocol

User Authentication Protocol opass: A User Authentication Protocol Sao Vikram B., Gore Vishwanath P., Sankhe Bhakti A., Rananaware Rahul C., ABSTRACT Password security is significant for user authentication on small networking system

More information

Creating Visually Appealing Documents. Word Module 2. Diocese of St. Petersburg Office of Training

Creating Visually Appealing Documents. Word Module 2. Diocese of St. Petersburg Office of Training Creating Visually Appealing Documents Word 2010 Module 2 Diocese of St. Petersburg Office of Training Training@dosp.org Diocese of St. Petersburg 0 9/5/2014 This Page Left Intentionally Blank Diocese of

More information

Improved Password Authentication System against Password attacks for web Applications

Improved Password Authentication System against Password attacks for web Applications Improved Password Authentication System against Password attacks for web Applications Vaishnavi Yalamanchili, Department of Computer Science & Engineering, Gudlavalleru Engineering College, Gudlavalleru,

More information